Create an account
many methods exist ot guarantee completely a computer or network is safe from computer viruses, worms, and trojan horses
biometric payment involves a customer's fingerprint being read by a fingerprint scanner that is linked to a payment method such as checkin account or credit card
a digital signature is a mathematical formula that generates a code from the contents of the message
digital rights management is a strategy designed to prevent illegal distriubtion of computer viruses etc.
green computing involves reducing the electricity while using a computer, but the practices increase enviormental waste.
physical access control such as locked doors and windows usually are adequate to protect against
defined as gaining inauthorized access or obtaining confedential info by taking advantage of the trusted human
examination of computer media, programs, data and log files on computers, servers, networks
a group of comprimised computers connected to a network that is being used as part of a network that attacks other networks
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together